Congratulations on achieving your CEH! I How do you PASS (any security test) if you don’t have money to go to BOOT CAMP.Here is how: Oh by the way if you want to advance your level or carrier please go to http://www.packet-level.com/library.htm and take her some classes.

Set up VMWARE with lab (all ISO with server)1)Download Knoppix SDT2)Download Back Track Tools3)Download SLAX4)Download BLAG / UBUNTU5)Download free other tools (you will find out after research)6)Try to learn some Python Based Shellcode Generator7)Try to learn some C# or Java (if you can handle .NET good for you)Read, Read, Read (the more you read the more learn)9)Online research A)http://www.isecom.org/projects/hpp.shtmlB)http://hackingtruths.in/C)http://www.actual-exams.comD)http://www.packetstormsecurity.org/E)http://www.bleedingsnort.com/F)http://www.securityfocus.com/G)http://searchsecurity.techtarget.com/H)http://insecure.org/I)http://www.snort.org/J)http://www.metasploit.com/K)http://www.counterhack.netL)http://www.logicalsecurity.com/M)http://www.securityspace.comN)http://www.enterpriseitplanet.comO)http://www.bestdown.com/P)http://directory.fsf.org/security/Q)http://www.hackersbook.com (I LOVE THIS BOOK)R)http://www.hellboundhackers.org/S)http://web.archive.orgT)http://www.hackerhighschool.org/lessons.shtmlU)http://archives.neohapsis.com/archives/stw/2007/V)http://www.kmint21.com/download.htmlW)WWW.ASTALAVISTA.NET (best / best/ best)

I think good hacker knows a lot of program to protect the system and bad hacker know how to crack the system from the learning program. CEH course is nothing inside really just give you a ticket to see DEFCON.

CEH certificate just let you in the door to see what the real world security look like. If you don’t have money please go to library and learn, learn, learn. All tools are free for learn 30-60 days. I thing download and learn. Remember technology change every day. You need to update your level. So read and learn will help you the real world professional job understanding. Get a certificate is not a big deal. The big deal is how much you know and how much you know to protect your network from BLACK HAT.

I particularly liked the 'Challenges' section on the hellboundhackers.org site.

Anyone studying or considering studying OSCP would get a lot of valuable experience with these challenges - noobs can get a lot of good pointers as to how to complete the challenges by reading the posts in the 'Articles' section, under the HBH Challenge Tutorials' section.

Be prepared to have to use your brain though - these are not 'walkthroughs' but more of a shove in the right direction.

For those on a budget self study and sitting the exams is a great way towards gaining certifications. That said I would like to emphasize how useful I've found classroom teaching in the past. With a experienced instructor you'll get much more from the course than you will from books, provided you are prepared to ask questions.

What would be useful in lieu of expensive courses would be online study groups. We could probably buddy up a few of the members here on the road to certification to study together and maybe even have some of the more experienced members offering mentoring sessions.

HackingRapid or reverse engineering of existing software to make it better

CrackerA person who uses his hacking skills for offensive purposes

Ethical HackerA person who uses his hacking skills for defensive purposesThreat A potential violation of security

VulnerabilityExistence of a weakness within a system that can lead to an exploit

Target of EvaluationA system that is identified as requiring security evaluationAttack an action that violates securityExploitThe exploitation of a vulnerability to cause an attack Hacker ClassesBlack HatsAlso known as CrackersThe Bad GuysExcellent Computing KnowledgeUse hacking for corrupt purposesWhite Hats Security AnalystsUse Hacking for defensive purposesGray HatsIndividuals who work both offensively and defensively at different timesElements of Security

Phase 3 - Gaining AccessStart of the True Attack PhaseExploit a vulnerability found in a resource identified in the scanning phase

Phase 4 - Maintaining AccessRetention of ownershipImportant for the hacker to regain use of the systemInstallation of Rootkits, Trojans, and backdoors are common

Phase 5 - Covering TracksAction taken to extend misuse of systems without being detected Steganography, tunneling Altering log filesSecurity TestingBlack BoxTesting with no Prior Knowledge of the network infrastructureWhite BoxTesting with knowledge of the network infrastructure

You received a 450 error due to the fact that it appears to their mail server that you have sent too many emails to the same person in too short a time frame. It's interesting that there were 2 RCPT To:'s on there for the same person which sounds like you may have double sent it to the person, or possibly more than that. Your AOL mail server will try to send the message again periodically until the message is delivered, or until 4 days have passed in which case you will get an email indicating that the mail was not deliverable. No need to cancel your PayPal account unless you just really dislike it or there is something else going on you haven't mentioned.

Nothing else is going on, I orded this item on the 6th this month it says about 7 days to be delivered. I have not got no email from them saying the item has been dispatched. I cant contact them so just worried that I will not be getting this item that is all.